trends-fintech

ThreatMetrix Quarterly Fintech Cybercrime Report 2017

Fintech Cybercrime Report 2017

ThreatMetrix has released its latest quarterly cybercrime report based on cybercrime attacks from October to December 2016, detailing trends across financial services and eCommerce, with a global study of traffic patterns and emerging threats.

Financial Services Key Trends

  • FFIEC mobile banking payment and guidance is forcing US financial institutions to better manage risk, while PSD2 has European financial service providers agitated. Furthermore, insider threats are notorious in many prominent financial service breaches.
  • Mobile usage for banking login and transacting is increasing rapidly with 55% of financial services transactions coming from mobile devices.
  • 80 million attacks were detected using stolen or fake credentials.
  • A 250% growth of financial service mobile transactions was noted year-on-year.
  • Banks are embracing mobile growth, and 55% of financial services transactions are mobile; Many banks are offering full-service apps, however, rejection rates for transactions are high.

eCommerce Key Trends for 2016

  • A higher volume of cross-border transactions is noted with the global village economy gaining strength and popularity. A severe disadvantage is an increase in online fraud.
  • With a 51% increase in transactions blocked year-on-year and twice as many transactions rejected as processed, systems are working overtime to protect users from threats.
  • Up to 90% of some retailers’ traffic is attributed to Bot attacks.
  • 75 million transactions were rejected this quarter with rejections of 11% of account creations, 6.4% of account logins, and 5.1% of payments.

The Threat Landscape

  • The US, UK, Germany, France and Brazil feature in the top five attacking nations, but emerging economies such as India, Qatar, Morocco, and Tunisia are showing strong attack growth too.
  • Strong attacking economies tend to attack similar economies.
  • In the last quarter, identity spoofing persisted in FinTech with a slow but steady growth in device spoofing and a slight decline in IP spoofing and Bots.
  • Digital mobility of global connected users increased with a quarter of transactions cross-border.
  • Device spoofing remains a top threat.
  • Mobile transaction grew globally by 130% year-on-year with highlights in both developing and developed countries.

Keeping the digital world safe and secure is an increasingly difficult job; security experts are relying on holistic approaches to digital identities to differentiate fraudsters from legitimate customers, and pulling in innovative applications of behavioral analytics and machine learning to better identify high-risk behavior.

By Jennifer Klostermann

Jennifer Klostermann

Jennifer Klostermann is an experienced writer with a Bachelor of Arts degree majoring in writing and performance arts. She has studied further in both the design and mechanical engineering fields, and worked in a variety of areas including market research, business and IT management, and engineering. An avid technophile, Jen is intrigued by all the latest innovations and trending advances, and is happiest immersed in technology.

CONTRIBUTORS

Battle of the Clouds: Multi-Instance vs. Multi-Tenant Architecture

Battle of the Clouds: Multi-Instance vs. Multi-Tenant Architecture

Multi-Instance vs. Multi-Tenant Architecture  The cloud is part of everything we do. It’s always there backing up our data, pictures, ...
The Good, Bad, and Downright Ugly Takeaways from WikiLeaks’ Vault 7

The Good, Bad, and Downright Ugly Takeaways from WikiLeaks’ Vault 7

WikiLeaks’ Vault 7 If you haven’t heard of the Vault 7 WikiLeaks data dump, you’ve probably been living under a ...
3 Ways to Protect Users From Ransomware With the Cloud

3 Ways to Protect Users From Ransomware With the Cloud

Protect Users From Ransomware The threat of ransomware came into sharp focus over the course of 2016. Cybersecurity trackers have ...
How Big Data Can Empower Native Ads

How Big Data Can Empower Native Ads

Empower Native Ads The realm of big data is expanding an astonishing rate, and its presence can be felt across ...
Safeguarding Data Before Disaster Strikes

Safeguarding Data Before Disaster Strikes

Safeguarding Data  Online data backup is one of the best methods for businesses of all sizes to replicate their data ...
Bryan Doerr

Cyber-Threats and the Need for Secure Industrial Control Systems

Secure Industrial Control Systems (ICS) Industrial Control Systems (ICS) tend to be “out of sight, out of mind.” These systems ...
Countdown to GDPR: Preparing for Global Data Privacy Reform

Countdown to GDPR: Preparing for Global Data Privacy Reform

Preparing for Global Data Privacy Reform Multinational businesses who aren’t up to speed on the regulatory requirements of the European ...
What’s Next In Cloud And Data Security For 2017?

What’s Next In Cloud And Data Security For 2017?

Cloud and Data Security It has been a tumultuous year in data privacy to say the least – we’ve had ...
Two 2017 Trends From A Galaxy Far, Far Away

Two 2017 Trends From A Galaxy Far, Far Away

Reaching For The Stars People who know me know that I’m a huge Star Wars fan. I recently had the ...
Cloud Computing Certification Courses

AWS S3 Outage & Lessons in Tech Responsibility From Smokey the Bear

AWS S3 Outage & Lessons in Tech Responsibility Earlier this week, AWS S3 had to fight its way back to ...

NEWS

Deloitte TMT Predictions: Machine Learning Deployments, On-Demand Content and Live Events Will Continue to Drive Growth

Deloitte TMT Predictions: Machine Learning Deployments, On-Demand Content and Live Events Will Continue to Drive Growth

NEW YORK, Dec. 12, 2017 /PRNewswire/ -- Deloitte forecasts double digital growth in machine learning deployments for the enterprise, an increasing worldwide ...
email as a service

Google Data Analysis, Artificial Intelligence and Predicting Vaccine Scares

Social media trends can predict tipping points in vaccine scares Analyzing trends on Twitter and Google can help predict vaccine ...
Hackers shut down infrastructure safety system in attack: FireEye

Hackers shut down infrastructure safety system in attack: FireEye

Hackers shut down infrastructure safety system (Reuters) - Hackers likely working for a nation-state recently penetrated the safety system of ...